Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Netzpalaver: FIDO2 Standard for Passwordless Authentication with New Features

The new features of Client-To-Authenticator-Protocol (CTAP) v2.1 and WebAuthn-Level 2 simplify the implementation of passwordless…

Read More →

Industry of Things: New FIDO Standard for Secure Onboarding of IoT Devices

The new industry standard from the FIDO Alliance promises to make the onboarding of IoT…

Read More →

DocAuFutur: FIDO Alliance: major novelties to go even faster to a passwordless world

The FIDO Alliance today unveiled its first User Experience (UX) guidelines and new enhancements to…

Read More →